chompie1337 / s8_2019_2215_pocLinks
PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass
☆235Updated 5 years ago
Alternatives and similar repositories for s8_2019_2215_poc
Users that are interested in s8_2019_2215_poc are comparing it to the libraries listed below
Sorting:
- ☆172Updated 5 years ago
- ☆107Updated 5 years ago
- Exploits for Android Binder bug CVE-2020-0041☆252Updated 5 years ago
- Frida-based general purpose fuzzer☆221Updated 5 years ago
- Research related☆89Updated 3 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆123Updated 4 years ago
- ☆63Updated 2 weeks ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆157Updated 6 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆91Updated 4 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆185Updated 4 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 6 years ago
- A Minimalist Instruction Extender for the ARM architecture and IDA Pro☆202Updated last year
- ☆201Updated 3 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆288Updated 5 months ago
- IDA plugins and scripts for analyzing register usage frame☆181Updated 2 years ago
- Android_Emuroot is a Python script that allows granting root privileges on the fly to shells running on Android virtual machines that use…☆137Updated 4 years ago
- Fuzzing harness for testing proprietary image codecs supported by Skia on Android☆353Updated 5 years ago
- ☆159Updated 6 years ago
- poc for cve-2020-0022☆67Updated 5 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆206Updated 3 years ago
- SSD Secure Disclosure Advisories☆170Updated 5 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆90Updated 6 years ago
- ☆222Updated 2 years ago
- ☆185Updated 3 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆129Updated 2 years ago
- A Binary Ninja plugin for vulnerability research.☆298Updated last year
- GDB plugin peda for arm☆146Updated 3 months ago
- ☆33Updated last month
- A gdb like debugger that provide a runtime env to unicorn emulator and additionals features!☆192Updated 2 years ago
- USB device fuzzing on Android Phone☆34Updated 4 years ago